General

  • Target

    7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda

  • Size

    1.0MB

  • Sample

    220228-dwbl1sdac8

  • MD5

    61a3d983a1fde813204b8f6f13842163

  • SHA1

    336a3a59b782b49c2253bd0afeefdb43b24f70b6

  • SHA256

    7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda

  • SHA512

    a6cdbc9faae3f9d989d9c5f165dd56c3822997e463bbc924b61067fb1b1719b14ec8d60a4046ade564bdc310dd6177dfa8e84d04a0ac9226cd3f1cfdeb2adbe9

Malware Config

Targets

    • Target

      7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda

    • Size

      1.0MB

    • MD5

      61a3d983a1fde813204b8f6f13842163

    • SHA1

      336a3a59b782b49c2253bd0afeefdb43b24f70b6

    • SHA256

      7963f8606e4c0e7502a813969a04e1266e7cd20708bef19c338e8933c1b85eda

    • SHA512

      a6cdbc9faae3f9d989d9c5f165dd56c3822997e463bbc924b61067fb1b1719b14ec8d60a4046ade564bdc310dd6177dfa8e84d04a0ac9226cd3f1cfdeb2adbe9

    • OutSteel

      OutSteel is a file uploader and document stealer written in AutoIT.

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks